How many of your data breaches are due to your own people, whether by accident or on purpose? Watch now to navigate the fact and fiction around insider threat with a light-hearted look at this serious risk topic.
All our webinars, all in one place
With the help of AI-driven tools, phishing scams can be executed on an unprecedented scale. We explore hackers’ intricate tactics, including how they impersonate trusted entities across industries and exploit vulnerabilities, as well as how machine learning can help spot the attacks bypassing our defences.
We explore the evolving market for vulnerability trading and examine whether companies are potentially creating their own weaknesses. Learn what ESET discovered when they tested decommissioning processes, including what critical data from the previous owner was still accessible and open to abuse.
SIEMs are powerful tools for detecting and responding to threats. Watch now as we explored why integration challenges persist, strategies to enhance the 'stickiness' of your SIEM, and case studies of how other organisations have tackled the challenge.
A security gap in your Active Directory could be enough to shut down your entire business operations. Watch now to learn how this happens, how a telco company recovered from this type of attack, and how you can respond effectively to an in-progress attack on your identity systems with step-by-step guidance.
See how malicious actors can use BGP hijacking to redirect users on the internet, and learn how the disruption can be accelerated by utilising botnets. Discover why this type of attack could be used, and how well-prepared we are to deal with it. We share real-life examples and give a demonstration.
Watch now for a discussion on the latest high-profile breaches, including Okta’s stolen source code, the theft of 200M Twitter users’ data, a ransomware attack that crippled a Louisiana hospital, and the stolen LastPass password vaults. We also looked at how Meta is making good on the Cambridge Analytica leak.
Do you use Kubernetes (or any other open-source container orchestration system) to help automate your software deployment and management? Watch now to learn how using default deployment settings introduces attack vectors that would allow an attacker to compromise your organisation’s systems, and what to do instead.